A
CCESS
C
ONTROL
L
IST
C
OMMANDS
4-117
•
sport
– Protocol
2
source port number. (Range: 0-65535)
•
dport
– Protocol
2
destination port number. (Range: 0-65535)
•
end
– Upper bound of the protocol port range. (Range: 0-65535)
Default Setting
None
Command Mode
Extended ACL
Command Usage
• All new rules are appended to the end of the list.
• Address bitmasks are similar to a subnet mask, containing four
integers from 0 to 255, each separated by a period. The binary mask
uses 1 bits to indicate “match” and 0 bits to indicate “ignore.” The
bitmask is bitwise ANDed with the specified source IP address, and
then compared with the address for each IP packet entering the port(s)
to which this ACL has been assigned.
Example
This example accepts any incoming packets if the source address is within
subnet 10.7.1.x. For example, if the rule is matched; i.e., the rule (10.7.1.0
& 255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0),
the packet passes through.
This allows TCP packets from class C addresses 192.168.1.0 to any
destination address when set for destination TCP port 80 (i.e., HTTP).
Related Commands
access-list ip (4-114)
show ip access-list
This command displays the rules for configured IP ACLs.
2. Includes TCP, UDP or other protocol types.
Console(config-ext-acl)#permit 10.7.1.1 255.255.255.0 any
Console(config-ext-acl)#
Console(config-ext-acl)#permit 192.168.1.0 255.255.255.0 any
destination-port 80
Console(config-ext-acl)#
Summary of Contents for 8728L2 - annexe 1
Page 2: ......
Page 15: ...CONTENTS xi ...
Page 19: ...TABLES xv ...
Page 32: ...INTRODUCTION 1 10 ...
Page 46: ...INITIAL CONFIGURATION 2 14 ...
Page 177: ...PORT CONFIGURATION 3 131 Figure 3 59 Displaying Etherlike and RMON Statistics ...
Page 258: ...CONFIGURING THE SWITCH 3 212 ...
Page 524: ...COMMAND LINE INTERFACE 4 266 ...
Page 532: ...TROUBLESHOOTING B 4 ...
Page 545: ......